logo

LAN Technologies: Impact, Design, Implementation, and Management

   

Added on  2024-06-04

10 Pages4281 Words127 Views
 | 
 | 
 | 
LO1 Understand the impact of LAN technologies
Task 1
A.C 1.1 critically evaluate different LAN technologies
Ans. An organization almost has the ownership of the whole network in the campus . Networks exist of
Ethernet , higher-speed Fast Ethernet, Gigabit Ethernet LANs,802.11 Wireless LANs, Fast Ether channel.
Institute of Electrical and Electronics Engineers (IEEE) Ethernet (802.3):
Ethernet comes under LAN technology which is derived from the Institute Of Electrical and Electronics
Engineers(IEEE) 802.3 standard and provides a 10Mbps bandwidth among two users or computers .LAN
Technology provides connection to other computer by technology of Ethernet and the speed which is
required is 10 Mbps among all the users.
For transmitting and getting at the same time stations work in full duplex mode. Full-duplex mode makes
execution of system along with a net where there is throughput of about 10 Mbps in all the heading or there
is throughput of 20 Mbps on every port.
Today, it is considered as the widest LAN technology .Electronically, It is taken in use for transferring the
media on a local area network . So, Ethernet can help in transferring the data to the computers who all are
connected locally the data includes videos , graphic and music. Star topology is deployed in the connection
of Ethernet. 48 bit MAC address is what the network connectors consist of Ethernet operates through that
only which helps in building the communication among the devices that are used in Ethernet. It extends to:
Fast Ethernet: Fast Ethernet provides a speed of 1000mbps which can run on optical fibre , UTP and
wireless. Normally in the Ethernet it uses CD but in fast Ethernet it uses CSMA/ CA which is basically
take in use to handle the expanding need for fast software and hardware technology.
Virtual LAN:
Virtual LAN is a process through which a single network of LAN is divided into more than two networks
in a virtual way. Virtually the host can each other as the host are not able to see each other physically. This
has been done for managing the bandwidth and the hike in the efficiency of the network gives the host a
good opportunity and metrics of security.
The examples mentioned above can take in use the LAN technologies which can be a mixture of both
technologies of LAN which are virtual since wireless LAN help in connecting all the departments which
are required and also the required centres .To safeguard the security virtual LAN is going to help and every
department needs its privacy.
Half-Duplex:
Half duplex is a part of LAN technologies .Half duplex have a lot of appliance that are working with it. In
half-duplex it follows these following steps:
1. Network interface card(NIC) send the frame.
2. Receiving pair has frame sent to it by NIC loops
3. frame is receieved by HUB.
4.To make other NICs receive electrical signal the frame by HUB on internal bus relays.
5.All the device available at the network through HUB repeats the signal which is received from all the
individual receiving pair.
LAN Technologies: Impact, Design, Implementation, and Management_1

Fast Ethernet IEEE 802.3u:
To increase expand transfer speed in environment of Ethernet is done by Fast Ethernet. Fast Ethernet keep
up the cabling plans of Ethernet, operations of CSMA/CD and all the convention operations of upper layer.
LAN Hardware:
Here, this portion covers the network devices hardware or hardware for LAN device .
Repeaters:
In a system the repeaters is a basic unit which units the single divisions . In the OSI model repeaters works
at the physical layer. Repeaters are considered straightforward because repeaters have no knowledge about
the upper layer conventions which includes IP, Internetwork Packet Exchange and many more.
HUB:
In LAN technology Hub is considered as a basic unit . The main difference between the hubs and the
repeaters is that it has more ports.
Bridges:
Bridges works on the principle of store-and-forward . where they keeps the whole frame or datagram and
then before forwarding it examine the cyclic redundancy check . If an error of Cyclic redundancy check is
found in either the frame or datagram then that frame or datagram is going to be discarded . Bridges are
ignorant of the protocols of upper layer. Bridges are taken in use to implement Spanning Tree
protocol(STP) for the purpose of manufacturing a system topology which is circle free. For the purpose of
trading data bridges correspond with one another.
Switches:
Switch is a more efficient LAN appliance . Switches runs in a cut –through mode where the switches does
not sit in a same position for the whole edge or datagram.
Broadcasts:
Specific edges or datagram is considered as broadcasts. FF-FF-FF-FF-FF-FF is a MAC address for telecast
it is considered as most surprising number which has been allowed in the MAC locations of 48-blueprint.
A.C 1.2 critically analyse traffic intensive services and their performance
Ans. When video streams or downloading a program is intense traffic which basically means that the
traffic on the network is busy because of the high demand of the activities. Email , chat ,web browsing and
many more are not considered as traffic intensive and do not take in use the resources of network like
downloading of large files, video .
Quality of service and the management of bandwidth is a vital in computer networking system because it
helps in analysing the performance and evaluating the performance and using different techniques it can
make it better.
A.C.1.3 Discuss LAN concerns and make recommendations to sustain network security, reliability
and performance
LAN Technologies: Impact, Design, Implementation, and Management_2

Ans. Since Local Area Network is considered as a local network has its benefits . The network has
data available on it because of which the local sharing is made possible to each the user present
excluding the user needs the data or the user wants the data. Because of which the exclusive data
present on the network is visible to all the parties using it which compromises the security of the
user. LAN network has a disadvantage of minimum security across its user so it is evident the major
security issues which is faced is internal not external. These situations are generally avoided since
NIU’s has been designed to avoid such data but due to some reason when it does not happen the
dynamics of security gets affected. LAN networks often get attacked by wiretapping which consist
of intercepting the personal information by someone who is not authorized and the other reason
why it happens because the network is not properly protected with firewalls. The issues of
performance in LAN is directly linked with the security, Quality of service, bandwidth as the user
become a part of the adequate use of network resources as its performance is being compromised.
There are many benefits which are provided by the wireless LANs but there are several concerns
also which the LAN face . firstly is the multipath propagation where the transmitted signals merges
with the reflected signals to shades the signal diagnose with the help of the receiver. This is
considered as the multipath distortion . Multipath propagation can be a notable issue and can be
more problematic for indoor application. The loss of path between the transmitter and receiver is a
thing which needs to be considered while a wireless LAN is being designed . The levels of path loss
expected according to the value between the transmitter and receiver , giving significant
information when evaluating requirements for levels of power being transmitted , sensitivity
receiver and signal to noise ratio (SNR). The major loss of path depends on the frequency
transmitted. Radio Signal interference feels interference from inward because transmitting systems
harmonics or also from products having radio frequencies of same kind in the region which is local.
Interference from outward occurs when the network signal of wireless is disrupting other systems
which is adjacent wireless LANs and the equipment for navigation used in aircraft.
In the hierarchical models of network consist of distributing the whole model into parts where
every individual layer is accountable for their functions which is profitable for the network when the
security is taken into consideration as each and every function operates independently to others .
The model of heirarchical network turns the network into being more scalable , increase
maintainability , reduces redundancy and manageability and turn the focus on work and privacy.
LO2 Be able to design LAN infrastructures
A.C 2.2 critically evaluate the suitability of LAN components
LAN Technologies: Impact, Design, Implementation, and Management_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents